"디피-헬만 키 교환"의 두 판 사이의 차이

수학노트
둘러보기로 가기 검색하러 가기
(→‎노트: 새 문단)
 
(→‎메타데이터: 새 문단)
21번째 줄: 21번째 줄:
 
===소스===
 
===소스===
 
  <references />
 
  <references />
 +
 +
== 메타데이터 ==
 +
 +
===위키데이터===
 +
* ID :  [https://www.wikidata.org/wiki/Q623447 Q623447]

2020년 12월 26일 (토) 06:04 판

노트

  • The general idea behind Diffie-Hellman is that Alice and Bob each start with a publicly known common color and a secret color.[1]
  • Communications using Diffie-Hellman all by itself are vulnerable to man in the middle attacks.[2]
  • Diffie-Hellman is well suited for use in data communication but is less often used for data stored or archived over long periods of time.[2]
  • Diffie-Hellman works on the principle of not sharing the encryption key over the wire completely.[3]
  • Diffie-Hellman is a key agreement algorithm used by two parties to agree on a shared secret.[4]
  • The Diffie-Hellman key exchange is a cryptographic protocol for exchanging cryptographic keys over a public channel.[5]
  • Alice and Bob agree to use the prime number \(p=17\) and the generator \(g=5\) for their Diffie-Hellman key exchange.[5]
  • The Diffie-Hellman key exchange uses large numbers and a lot of computations for cryptography.[6]
  • With the Diffie-Hellman key exchange, both parties get the same result, without sending the shared secret across the communication channel.[6]
  • The Diffie-Hellman key exchange is implemented in multiple ways.[6]
  • Static Diffie-Hellman Key Exchange – Static Diffie-Hellman uses certificates for authenticating the server.[6]
  • Diffie-Hellman uses modular exponentiation, which is also known as repeated sequence algorithm.[7]
  • First, let’s look at why we need Diffie-Hellman (DH) key exchange in the first place.[8]
  • The Diffie-Hellman key exchange was the first publicly-used mechanism for solving this problem.[9]
  • The main purpose of the Diffie-Hellman key exchange is to securely develop shared secrets that can be used to derive keys.[9]
  • Technically, the Diffie-Hellman key exchange can be used to establish public and private keys.[9]
  • The Diffie-Hellman key exchange is complex and it can be difficult to get your head around how it works.[9]
  • For Diffie-Hellman to be secure, it is desirable to use a prime p with 1024 bits; in base 10 that would be about 308 digits.[10]

소스

메타데이터

위키데이터